A buffer overflow bug was found in the way Thunderbird processes GIFimages. It is possible for an attacker to create a specially crafted GIFimage, which when viewed by a victim will execute arbitrary code as thevictim. The Common Vulnerabilities and Exposures project (cve.mitre.org)has assigned the name CAN-2005-0399 to this issue.

A bug was found in the Thunderbird string handling functions. If amalicious website is able to exhaust a system's memory, it becomes possibleto execute arbitrary code. The Common Vulnerabilities and Exposures project(cve.mitre.org) has assigned the name CAN-2005-0255 to this issue.

Users of Thunderbird are advised to upgrade to this updated package whichcontains Thunderbird version 1.0.2 and is not vulnerable to these issues.

4. Solution:

Before applying this update, make sure that all previously-releasederrata relevant to your system have been applied. Use Red HatNetwork to download and update your packages. To launch the Red HatUpdate Agent, use the following command:

up2date

For information on how to install packages manually, refer to thefollowing Web page for the System Administration or Customizationguide specific to your system: